{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-04-29T00:00:00.000Z","descriptions":[{"lang":"en","value":"The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO & !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-01-05T14:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"USN-2203-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2203-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html"},{"name":"106646","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/106646"},{"name":"SUSE-SU-2014:0683","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"},{"name":"[oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption","tags":["mailing-list","x_refsource_MLIST"],"url":"http://www.openwall.com/lists/oss-security/2014/05/05/6"},{"name":"59262","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59262"},{"name":"USN-2204-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2204-1"},{"name":"59218","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59218"},{"name":"USN-2202-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2202-1"},{"name":"33516","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"http://www.exploit-db.com/exploits/33516"},{"name":"DSA-2928","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2014/dsa-2928"},{"name":"USN-2199-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2199-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.oracle.com/errata/ELSA-2014-0771.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1094232"},{"name":"USN-2197-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2197-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://source.android.com/security/bulletin/2016-07-01.html"},{"name":"RHSA-2014:0512","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0512.html"},{"name":"59599","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/59599"},{"name":"DSA-2926","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2014/dsa-2926"},{"tags":["x_refsource_CONFIRM"],"url":"https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00"},{"name":"SUSE-SU-2014:0667","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"},{"tags":["x_refsource_MISC"],"url":"http://pastebin.com/raw.php?i=yTSFUBgZ"},{"tags":["x_refsource_CONFIRM"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00"},{"tags":["x_refsource_CONFIRM"],"url":"http://bugzilla.novell.com/show_bug.cgi?id=875690"},{"name":"USN-2198-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2198-1"},{"name":"USN-2200-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2200-1"},{"name":"USN-2201-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2201-1"},{"name":"USN-2196-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/USN-2196-1"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T09:05:39.223Z"},"title":"CVE Program Container","references":[{"name":"USN-2203-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2203-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15319.html"},{"name":"106646","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/106646"},{"name":"SUSE-SU-2014:0683","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"},{"name":"[oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2014/05/05/6"},{"name":"59262","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59262"},{"name":"USN-2204-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2204-1"},{"name":"59218","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59218"},{"name":"USN-2202-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2202-1"},{"name":"33516","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"http://www.exploit-db.com/exploits/33516"},{"name":"DSA-2928","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2014/dsa-2928"},{"name":"USN-2199-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2199-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.oracle.com/errata/ELSA-2014-0771.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1094232"},{"name":"USN-2197-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2197-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://source.android.com/security/bulletin/2016-07-01.html"},{"name":"RHSA-2014:0512","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2014-0512.html"},{"name":"59599","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/59599"},{"name":"DSA-2926","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2014/dsa-2926"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/torvalds/linux/commit/4291086b1f081b869c6d79e5b7441633dc3ace00"},{"name":"SUSE-SU-2014:0667","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://pastebin.com/raw.php?i=yTSFUBgZ"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://bugzilla.novell.com/show_bug.cgi?id=875690"},{"name":"USN-2198-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2198-1"},{"name":"USN-2200-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2200-1"},{"name":"USN-2201-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2201-1"},{"name":"USN-2196-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/USN-2196-1"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.5,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"NONE"}},{"other":{"type":"ssvc","content":{"id":"CVE-2014-0196","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-02-07T13:36:55.768079Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2023-05-12","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0196"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0196","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-362","description":"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}],"timeline":[{"time":"2023-05-12T00:00:00.000Z","lang":"en","value":"CVE-2014-0196 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-22T00:05:37.666Z"}}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2014-0196","datePublished":"2014-05-07T10:00:00.000Z","dateReserved":"2013-12-03T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:37.666Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}